Android* Devices in a Bring-Your-Own-Device Environment

Android* Devices in a BYOD Environment

Executive OverviewWhile the diversity of devices running the Google Android* OS can present challenges, Intel IT found that we can add them to our enterprise network in a secure, timely way. We adapted the same bring-your-own-device (BYOD) best practices developed for other devices to meet Intel’s security and eDiscovery requirements and privacy policies.

There are more than 20,000 Android-based devices, encompassing over 800 combinations of Android OS versions and hardware, in Intel’s BYOD program. We enable employees to work on Android devices because the OS is a powerful platform for developing innovative devices and applications. As with other BYO devices, we had to meet certain requirements:• Support a range of Android devices while keeping enterprise data secure and meeting our eDiscovery criteria• Develop security criteria for Android devices for use in our BYOD “trust score” algorithm• Determine the level of enterprise network access appropriate for each Android device model• Provide employees with options that can enhance a device’s security if it does not qualify for the requested level of access

Executive OverviewWhile the diversity of devices running the Google Android* OS can present challenges, Intel IT found that we can add them to our enterprise network in a secure, timely way. We adapted the same bring-your-own-device (BYOD) best practices developed for other devices to meet Intel’s security and eDiscovery requirements and privacy policies.

There are more than 20,000 Android-based devices, encompassing over 800 combinations of Android OS versions and hardware, in Intel’s BYOD program. We enable employees to work on Android devices because the OS is a powerful platform for developing innovative devices and applications. As with other BYO devices, we had to meet certain requirements:• Support a range of Android devices while keeping enterprise data secure and meeting our eDiscovery criteria• Develop security criteria for Android devices for use in our BYOD “trust score” algorithm• Determine the level of enterprise network access appropriate for each Android device model• Provide employees with options that can enhance a device’s security if it does not qualify for the requested level of access